Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities :: Security & Encryption
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • This little program wipe file(s) and folder secure. Support the following method: Single overwrite with Zeros and pseudoram, RCMP..DoD wipe: US Department of Defense of Defense 5220.22 compliant wiping) and Gutmann's Maximum Security 35 pass wiping method. This program support DRAG&DROP. FREEWARE
  • With KDT Site Blocker, you can easily filter and modify access to specific websites. KDT Site Blocker comes complete with an installer, uninstaller, and easy-to-use instructions of how you can gain full control of your computer. KDT Site Blocker easily blocks and unblocks access to an unlimited number of websites. Works with all browsers, and can ultimately protect your family from online threats and unwanted content.
  • Features: * Secure encryption of any files and documents with 256 Bit Twofish algorithm * 3 optional log-in methods (PIN, text, picture password) * Graphical authentication: highest security warranted by the patented visual Key technology * Encrypt or decrypt all files of a folder (with subfolders) with a few clicks * Start decrypted document automatically * Logging of all actions * Integration into the file explorer's context menu for easy access * Compatibility with Windows Mobile 6
  • WinTweakz PrivacyGuard guarantees your privacy by ensuring all traces of your online Internet and computer activities are permanently erased and unrecoverable on your PC. You can safely clean your activity traces on your PC.
  • Keyboard recording software records online chat conversation, email ids, typed key strokes, visited websites URLs and prevents unauthorized user to access your computer. Invisible Key logging application does not detected by antivirus software or spy tools, runs in background with stealth mode and completely unrecognizable during monitoring session that is cannot see in add remove program list, system startup, program menu and task manager list, or even you can hide the installation folder path so that external user is unable to access it. Key stroke monitoring tool tracks online chat conversation, documents, visited web sites URL, email ids, instant messages, user names, passwords and other keyboard typing activities and captures windows screenshots, events in a hidden or encrypted password protected log file which prevent others external users except administrator to change the software configuration settings. Keyboard tracker system monitors multiple user accounts, restricted contents and offensive sites v ...
  • Get Folder Password Protection Utility Folder Password Protection with highly advanced Folder protection software. Now users can easily opt for Folder Password Protection and secure their private and confidential data from unauthorised accesses. Folder Password Protection utility is an advanced folder security solution that has made Folder Password protection activity very easy. Now users can easily lock a folder and encrypt unlimited files, folders, drives and pictures with single click of mouse. This Folder Password Protection Utility encrypts folders and files and make then inaccessible and highly secure and adds an eye catching locked icon on protected folders and files. Once you?re Files and folders are protected then your data is safe from kids, friends and co-workers. This Folder Password Protection utility can used to protect files and folders on USB Flash Drives, Memory Sticks, CD-RW and notebooks. Folder Password Protection utility allows users to protect their private folders with single cli ...
  • Don't let your hard work slip down the drain! PDF Profit Lock lets you add password protection, self-expiring files, splash screens, exit pop-ups...even your own icons! Installation is a breeze and protecting your PDF files takes less than five minutes a book. If you don't have PDF Profit Lock, you're throwing money down the drain with every download.
  • PowerCryptor is a program to password protects your documents, photos, music, videos and other. Just right-click on file or folder in windows explorer and choose Encrypt. PowerCryptor makes it as easy to open, edit and save encrypted files, as it is to work with unencrypted files. You can securely erase your files beyond recovery. This way, your privacy protection is ensured and no one will be able to access your confidential data.
  • Keystroke recorder keylogger is a top-rated, invisible and easy-to-use surveillance tool that records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver. Keystroke recorder keylogger can also detection specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer. It causes no suspicious slowdowns and takes very few system resources...
  • Software that remembers your password for unlimited programs. This software also remembers other important information like your usernames. Never forget your passwords again!
  • PC Spy Software logs all Facebook, PC & internet activity and emails log reports to you. PC Spy Software logs all keystrokes, chats & IMs, emails, websites visited, applications, usernames, passwords, documents opened, online searches, microphone sound and more. It takes screenshots like a spy cam. PC Spy Software runs invisibly and PC users won't know its existence. Great for monitoring employees, children, spouse and investigating crime
  • The Java AntidecompilerTM is a development tools for building secure Java applications and components protected against various hacker attacks, including reverse engineering, recompiling, and so on. The protection includes also time-locking of evaluation versions, HASP locking for Java, license protection, and some other features.
  • Automatically lock your computer with a username and password at specified intervals. Locks can be set to occur every 30 minutes, 1 hour, 24 hours, etc. This application sits in the system tray at the bottom right corner of the screen.
  • FileShredder is a simple application that can be used for deleting unwanted files on your hardrive. We all know that windows don't realy deletes files on you drive and with software like Ontrack EasyRecovery, PC Inspector File Recovery and GetDataBack, could recover any of the files. But up till now with FileShredder I was not able to recover any of the files I tested on. So enjoy and be carefull because you will not be able to recover the files
  • Powerful encryption software with pre-boot authentication secures 100% of your hard disk drive, including the OS. Secure Disk provides the ultimate security standard for encryption at the physical sector level. Based on the most secure technology, AES256, this product is an outstanding data security tool.
  • Computer Spy Software monitors others' PC usage when you're away. It secretly logs all keystokes, online chats, instant messages, emails, web sites visited, applications run and more. It is a great tool to monitor activities about MSN Messenger, Yahoo! Messenger, ICQ, Skype, AIM, MySpace, Facebook, etc. Computer Spy Software takes screenshots like a spy camera. You can receive reports remotely via emails.
  • SafeHouse provides total privacy and protection for your sensitive files and folders using passwords and strong encryption. SafeHouse features military-strength encryption which is completely transparent to the way you work and compatible with all Windows applications. This software is amazingly simple to use and works on all drives, including external USB devices, memory sticks and CD/DVDs. SafeHouse also supports saving passwords to smartcards.
  • FlyingBit Password Keeper offers a simple solution for the problem of remembering a lot of confidential information. For example, it may include passwords, serial numbers and all kinds of codes. Data is stored in a special encrypted database. Thus, even if someone gains access to the storage, it will be impossible to read information from it.
  • Any program which you install adds items to the Start Menu and the Add/Remove Programs List in the Control Panel. Using this Control Panel applet, anyone who has access to your computer can view which programs you have installed on your PC and un-install them. Hide Programs lets you hide programs from the Add/Remove Programs List or re-show them. You can also temporarily hide Start Menu items without deleting them.
  • Protecting your computer from malicious attacks over the Internet is essential and an anti-virus program alone is simply not enough. An intrusion prevention system such as DefenseWall Personal Firewall will completely solve the problem of infection by malicious software. However, unlike other solutions, this is the world's first sandbox firewall, designed to be easy to use and requiring no complicated setup or configuration process.
  • Invisible PC Keylogger secrectly records all Facebook use, keystrokes typed, Skype, Windows Live Messenger and Yahoo Messenger chats, websites visited, emails read, microphone sound, documents opened, windows opened, clipboard data, passwords typed and applications executed. It sends logs to a specified email like every 60 minutes. It is completely invisible to the monitored users. Great tool for catching cheaters, monitoring kids and e
  • Professional PC monitoring utility records password, email, chat conversation, document which are typed using keyboard of computer system. Stealth Keylogger software traces all information of visited websites, URLs, and keystrokes. Windows Vista Keylogger tool automatically records screen shots or desktop information when any person uses system in your absence. Advance Keylogger tool works in hidden mode and not tracked by any antivirus software. Keystroke recorder software can restore recent or previously accidently lost login id, passwords or other data. Stealth Keylogger utility has password protected feature that protects unauthorized user to change or modify software configuration or settings. Keyboard monitor software is case sensitive while recording key pressed by keyboard. Advance Keylogger tool helps parents to watch activities of his children net surfing or other activities performed on computer system. Keystroke recorder utility does not require any other technical support for use. Windows Vista K ...
  • Windows Spy software secrectly logs all keystrokes, web sites, emails, chats & IMs: MSN Messenger, Windows Live Messenger, ICQ, AOL / AIM, Yahoo! Messenger, Windows Messenger and Skype. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like MySpace, Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp.
  • Privacy Eraser Pro is an internet eraser that protects your privacy by permanently erase Internet history and past computer activities. Privacy Eraser Pro completely implements the US Department of Defense DOD 5220.22 M and NSA clearing and sanitizing standard, to gives you confidence that once deleted with Privacy Eraser Pro, your file data is gone forever and can not be recovered.
  • Do you want to prevent your computer from unauthorized access? Download professional keyboard surveillance and monitoring software to keep track on every pressed key activity on your PC. Keyboard activity logger program is developed to perform its surveillance operation in background, capable to record all the keystrokes like user account login and passwords, chat conversations and rest all keyboard typing activities too. Undetectable keystroke recorder is a complete stealth utility which runs completely undetectable and invisible. Keyboard access control application because of its hidden operation, cannot be seen at control panel, start menu, add-remove programs and task manager window. Windows Vista key logger tool will provide you the backup of what was typed in so it can be cut-and-pasted instead of re-writing. Child internet protection software supports various operating systems including 98, ME, NT, 2000, XP and Vista. Security tool invisibly logs and is capable of recording keystrokes of every activity ...

Page 28 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2020 IT Shareware